First published: Fri Feb 04 2022(Updated: )
A flaw was found in envoy. When a cluster is deleted via the Cluster Discovery Service, a stack exhaustion may occur.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Envoyproxy Envoy | >=1.20.0<1.20.2 | |
Envoyproxy Envoy | =1.21.0 | |
redhat/servicemesh-proxy | <0:2.0.9-3.el8 | 0:2.0.9-3.el8 |
redhat/servicemesh-proxy | <0:2.1.2-4.el8 | 0:2.1.2-4.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23606 is a vulnerability found in Envoy, an open-source edge and service proxy, which allows for a stack exhaustion leading to denial of service (DoS) when a cluster is deleted via the Cluster Discovery Service (CDS).
The severity of CVE-2022-23606 is rated as medium with a CVSS (Common Vulnerability Scoring System) score of 6.5.
CVE-2022-23606 impacts Envoy by causing a stack exhaustion, resulting in a denial of service (DoS) condition when a cluster is deleted via the Cluster Discovery Service (CDS).
Versions up to and including 1.20.2 and version 1.21.0 of Envoy are affected by CVE-2022-23606.
To mitigate CVE-2022-23606, it is recommended to upgrade to Envoy version 1.20.3 or later, or version 1.21.1 or later.